AbuseIPDB » 41.32.99.109

Check an IP Address, Domain Name, or Subnet

e.g. 3.235.101.141, microsoft.com, or 5.188.10.0/24

41.32.99.109 was found in our database!

This IP was reported 32 times. Confidence of Abuse is 29%: ?

29%
ISP TE Data
Usage Type Fixed Line ISP
Hostname(s) host-41.32.99.109.tedata.net
Domain Name tedata.net
Country Egypt
City Al Khankah, Al Qalyubiyah

IP info including ISP, Usage Type, and Location provided by IP2Location. Updated monthly.

IP Abuse Reports for 41.32.99.109:

This IP address has been reported a total of 32 times from 17 distinct sources. 41.32.99.109 was first reported on , and the most recent report was .

Old Reports: The most recent abuse report for this IP address is from . It is possible that this IP is no longer involved in abusive activities.

Reporter Date Comment Categories
legitssl
Icarus honeypot on github
Hacking
marcel-knorr.de
[MK-Root1] Blocked by UFW
Port Scan Brute-Force
legitssl
Icarus honeypot on github
Hacking
RoboSOC
Honeypot attack, port: 445, PTR: host-41.32.99.109.tedata.net.
Hacking
legitssl
Icarus honeypot on github
Hacking
gbetsis
SMB Server BruteForce Attack
Port Scan Brute-Force
NotACaptcha
Unauthorised access (Aug 24) SRC=41.32.99.109 LEN=52 TTL=117 ID=6739 DF TCP DPT=445 WINDOW=8192 SYN
Port Scan
ChillScanner
<SMB> TCP (SYN) 41.32.99.109:61112 -> port 445, len 52
Port Scan
ChillScanner
<SMB> TCP (SYN) 41.32.99.109:65282 -> port 445, len 52
Port Scan
ChillScanner
<SMB> TCP (SYN) 41.32.99.109:64993 -> port 445, len 52
Port Scan
ChillScanner
<SMB> TCP (SYN) 41.32.99.109:60956 -> port 445, len 52
Port Scan
ChillScanner
<SMB> TCP (SYN) 41.32.99.109:52739 -> port 445, len 52
Port Scan
FEWA
Fail2Ban Ban Triggered
Hacking Brute-Force
marcel-knorr.de
[MK-Root1] Blocked by UFW
Port Scan Brute-Force
andi-naether.de
[H1] Blocked by UFW
Port Scan Brute-Force

Showing 1 to 15 of 32 reports


Is this your IP? You may request to takedown any associated reports. We will attempt to verify your ownership.

Recently Reported IPs:

** This Document Provided By AbuseIPDB **
Source: https://www.abuseipdb.com/check/41.32.99.109